Threat Intelligence

How to Troubleshoot Create Cluster Failures

First published on MSDN on May 07, 2012 In this blog, I will outline the steps in order to troubleshoot “Create Cluster” failures with Windows Server 2012 or later Failover Clustering. Step 1: Run the Cluster Validation Tool The cluster validation tool runs a suite of tests to verify that your hardware and settings are […]

How to Troubleshoot Create Cluster Failures Continue Reading

INTUNE – Intune and Autopilot Part 4 – Enroll your first device

First published on MSDN on Nov 27, 2018 In the last blog posts, INTUNE – Intune and Autopilot Part 1 – The Blueprint INTUNE – Intune and Autopilot Part 2 – Setting up your environment Intune and Autopilot Part 3 – Preparing your environment we guided you through all the necessary steps to get your

INTUNE – Intune and Autopilot Part 4 – Enroll your first device Continue Reading

How Azure Security Center helps you protect your environment from new vulnerabilities

Recently the disclosure of a vulnerability (CVE-2019-5736) was announced in the open-source software (OSS) container runtime, runc. This vulnerability can allow an attacker to gain root-level code execution on a host. Runc is the underlying container runtime underneath many popular containers. Azure Security Center can help you detect vulnerable resources in your environment within Microsoft

How Azure Security Center helps you protect your environment from new vulnerabilities Continue Reading

Best practices to consider before deploying a network virtual appliance

A network virtual appliance (NVA) is a virtual appliance primarily focused on network functions virtualization. A typical network virtual appliance involves various layers four to seven functions like firewall, WAN optimizer, application delivery controllers, routers, load balancers, IDS/IPS, proxies, SD-WAN edge, and more. While the public cloud may provide some of these functionalities natively, it

Best practices to consider before deploying a network virtual appliance Continue Reading

Step-by-Step: How to configure a SQL Server 2008 R2 Failover Cluster Instance in Azure

Introduction If you are reading this article you probably are still using SQL Server 2008/2008 R2 and want to take advantage of the extended security updates that Microsoft is offering if you move your SQL Server 2008/2008 R2 into Azure. I previously wrote about this topic in this blog post. You may be wondering how

Step-by-Step: How to configure a SQL Server 2008 R2 Failover Cluster Instance in Azure Continue Reading

Step-By-Step: Creating an Azure Point-to-Site VPN

Site-to-Site VPN is the most common method organizations use to connect on-premises network to Azure vNet. This VPN connection is initiated in your edge firewall or router level. But what if you connecting from remote location such as home? We can use point-to-site method to do that. In this method it will use certificates to

Step-By-Step: Creating an Azure Point-to-Site VPN Continue Reading

SCCM on Windows Server 2016: The Defender Gotcha

Hello! My name is Todd Linke, and I am a Premier Field Engineer at Microsoft where I specialize in System Center Configuration Manager. I was working with some customers who were seeing strange behavior on their SCCM Site Servers. In one case, an unusually high percentage of clients had corrupt hardware inventories. Looking at the

SCCM on Windows Server 2016: The Defender Gotcha Continue Reading

Windows Defender ATP has protections for USB and removable devices

Meet Jimmy. Jimmy is an employee in your company. He Does Things With Computers (official title). Last Wednesday, as Jimmy got out of his car after parking in the company-owned parking lot, he saw something on the ground. That “something” is a 512GB USB flash drive! Jimmy picks up the drive, whistling along to himself

Windows Defender ATP has protections for USB and removable devices Continue Reading

PowerShell Basics: Finding Your Way in the PowerShell Console

For me, one of the most important features of PowerShell is the ability to find all the answers you need in the shell. From the early days, PowerShell has included commands for finding cmdlets and functions within the shell including Get-Command. Get-Command is one of the three most well-known PowerShell commands, Get-Help and Get-Member being

PowerShell Basics: Finding Your Way in the PowerShell Console Continue Reading

Windows Defender ATP device risk score exposes new cyberattack, drives Conditional access to protect networks

Several weeks ago, the Windows Defender Advanced Threat Protection (Windows Defender ATP) team uncovered a new cyberattack that targeted several high-profile organizations in the energy and food and beverage sectors in Asia. Given the target region and verticals, the attack chain, and the toolsets used, we believe the threat actor that the industry refers to

Windows Defender ATP device risk score exposes new cyberattack, drives Conditional access to protect networks Continue Reading